Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
215
REFERENCES
Abbadi et. al., 2014, ―Image Encryption Based On Singular Value Decomposition‖
Journal of Computer Science, Vol. 10, No. 7 Page No. 1222-1230
Abomhara et. al., 2010, ―An Overview of Video Encryption Techniques‖,
International Journal Of Computer Theory And Engineering, Vol. 2, No. 1, Page
No.103-110
Abomhara et. al., 2010, ―Enhancing Selective Encryption for H.264/AVC Using
Advanced Encryption Standard‖ International Journal Of Computer Theory And
Engineering, Vol. 2, No. 2, Page No. 223-229
Aggarwal et. al., 2014, ―Design and Implementation of Video Encryption for
Multimedia Applications‖, International Journal Of Engineering Research And
Applications, Vol. 4 No. 2, Page No.29-34
Agi and Gong, 1996, ―An Empirical Study of Secure MPEG Video Transmissions‖,
Proceedings of the 1996 Symposium on Network and Distributed System Security,
Page No. 137
Agrawal et. al., 2012, ―Partial Encryption Algorithm for Secure Transmission of
Multimedia Messages‖, International Journal On Computer Science And Technology,
Vol. 3,No.1 Page No. 467-470
Agrawal et. al., 2012, ―A Fast and Secure Selective Encryption Scheme using Grid
Division Method‖ International Journal Of Computer Applications, Vol. 51 No.4
Page No. 29-33
Al-Semari et. al., 1999, ―Improved Selective Encryption Techniques for Secure
Transmission of MPEG Video Bitstreams‖, in Proceedings of the 1999 international
Conference on image Processing (ICIP '99), Vol. 4. Page No. 256-260.
Al-Asmari et. al. 2009, ―A Pyramid-Based Technique for Digital Color Images
Copyright Protection,‖ International Conference on Computing, Engineering and
Information, Page No. 44-47
216
Ali et. al. 2012, ―Digital Image Watermarking Basics, and Hardware
Implementation‖, International Journal of Modeling and Optimization, Vol. 2, No. 1,
Page No. 19-24
Armbrust et. al. 2010, ―A View of Cloud Computing‖. Communications of the ACM
Vol. 53, No. 4, Page No. 50–58
Ashraf and Chong, 1997, ―Performance analysis of H.261 and H.263 video coding
algorithms‖. Proceedings of the 1997 IEEE International Symposium on Consumer
Electronics, Page No. 153-156.
Atul and Alexandros, 1998, ―MPEG-4: An object-based multimedia coding standard
supporting mobile applications‖. Mobile Networks Applications, Vol.3, Page No. 5-
32.
Aung et. al., 2014, ―A Novel Secure Combination Technique of Steganography and
Cryptography‖ International Journal of Information Technology, Modeling and
Computing (IJITMC), Vol. 2, No. 1, Page No. 55-62
Ayele et. al., 2012 ―Review of Proposed High Efficiency Video Coding (HEVC)
Standard‖ International Journal of Computer Applications, Vol. 59 No.15 Page No. 1-
9
Bamane et. al. 2013, ―Hybrid Video Watermarking Technique By Using DWT &
PCA‖, International Journal Of Electronics And Communication Engineering &
Technology, Vol. 4, No. 2 Page No. 172-179
Basheera et. al., 2013, ―Distortion Free Fragile Watermarking Technique For
Medical Images‖ International Journal of Computer Science Engineering and
Information Technology Research, Vol. 3 No. 2, Page No. 187-192
Bhargava, Shi and Wang, 2004 "MPEG video encryption algorithms", Multimedia
Tools Applications, Vol. 24, no. 1, Page No. 57 -79
Bhattacharya et. al., 2006, ―Survey on Different Video Watermarking Techniques
and Comparative Analysis with Reference to H.264/AVC‖, IEEE, 1-4244-0216-6
217
Berna, et. al. 1998, ―The H.263+ video coding standard: Complexity and
performance‖ Proceedings of the Data Compression Conference, Page No. 259-268.
Bernd et. al., 1995, ―Comparison of the H.263 and H.261 video compression
standards‖ SPIE Proceedings Standards Common Interfaces Video Information
System, CR60: Page No. 233-251
Bisdikian et. al., 1995, ―Issues on movie allocation in distributed Video-on-Demand
systems‖. In Proceedings of the IEEE ICC, Page No. 250-255
Bisla et. al., 2013, ―Comparative Study of DWT and DWT-SVD Image
Watermarking Techniques‖ International Journal Of Advanced Research In Computer
Science And Software Engineering, Vol. 3 No.6, Page No. 821-825
Brubeck et. al. 1996, ―Hierarchical storage management in a distributed VoD
system‖ IEEE Multimedia, Page No. 37-47
Burman et. al., 2013, ―Histogram Based Color Image Authentication By Digital
Image Watermark Technique‖, International Journal Of Engineering Research And
Applications ISSN: 2248-9622 Vol.3 No. 4.Page No. 321-326
Cao et. al., 2013, ―QoS-aware Virtual Machine Scheduling for Video Streaming
Services in Multi- Cloud‖, TST, Vol. 18 No 1
Cha et. al., 2012, ―Design of StraaS (Streaming as a Service) based on Cloud
Computing‖ International Journal of Multimedia and Ubiquitous Engineering, Vol.
7, No. 4, Page No.187-200
Chakravarthy et. al., 2014, ―A Three Way Reversible Encipherment Mechanisms
for Robust Video Data Hiding Using Selective Embedding and Forbidden Zone Data
Hiding‖, International Journal Of Computer Science And Information Technologies,
Vol. 5 No.1,Page No. 873-875
Chandra et. al., 2012, ―A Novel Approach of Digital Video Encryption‖
International Journal Of Computer Applications, Vol. 49 No.4, Page No. 38-42
218
Chang et. al., 2001, ―Overview of the MPEG-7 standard‖ IEEE. Trans. Circ. Syst.
Video Technol., Vol. 11, Page No. 688-695.
Chen et. al., 2007, ―On the Design of Perceptual MPEG-Video Encryption
Algorithms‖ IEEE Transactions on Circuits And Systems For Video Technology, Vol.
17, No. 2, Page No. 214-223
Chen et. al, 2014, ―Efficient Compression-Jointed Quality Controllable Scrambling
Method for H.264/SVC‖ International Journal of Network Security, Vol.16, No.6,
Page No. 541-548
Cheng, 2000, ―Partial encryption of compressed images and video‖, IEEE Trans,
Signal Processing, Vol. 48 No. 8, Page No. 2439-2451
Chow et. al. 2009, ―Controlling Data in the Cloud: Outsourcing Computation without
Outsourcing Control‖. In Proceedings of ACM workshop on Cloud computing
security
Cox,et. al., 1999, ―Watermarking as Communications with Side Information,‖ Proc.
of the IEEE, Vol. 87 No. 7, Page No. 1127-1141
Cox et. al., 1997, ―Secure spread spectrum watermarking for multimedia‖, IEEE
transactions on image processing, Vol. 6, Page No. 1673-1687
Dandamwar et. al., 2012, ―Introduction to Real Time & Secure Video Transmission
using Distributed & Parallel Approach‖ International Journal of Computer Science
and Network, Vol. 1 No. 5
Darmstaedter et. al., 1998, ―A block based watermarking technique for MPEG-2
signals: Optimization and validation on real digital TV distribution links‖,
Proceedings 3rd European Conference on Multimedia Applications, Services and
Techniques, Page No. 190-206
Deguillaume et. al., ―Robust 3D DFT video watermarking‖, Proceedings of the SPIE,
Vol. 3657, Page No. 113-124.
219
Dhande et. al., 2014, ―Hide Inside-Separable Reversible Data Hiding in Encrypted
Image‖, International Journal Of Innovative Technology And Exploring Engineering,
Vol.3 No.9 Page No. 88-91
Díaz et. al. 2007, ―Evaluating video streaming over GPRS/UMTS networks: a
practical case‖, in: The 65th IEEE Vehicular Technology Conference. VTC IEEE
Computer Society, Page No. 624–628.
Duan et. al., 2012, ―Benefits And Drawbacks Of Cloud-Based Versus Traditional
ERP Systems‖ Proceedings of the 2012-13course on Advanced Resource Planning
Ducheneaut et. al., 2008, ―Social TV: Designing for distributed, sociable television
viewing,‖ International Journal Human-Computing Interaction, Vol. 24, No. 2, Page
No. 136– 154
Durdi et. al., 2013, ― Robust Video Transmission over Wireless Networks Using
Cross Layer Approach‖ Journal of Industrial and Intelligent Information Vol. 1, No.
2, Page No. 97-101
Elkilani, et. al., 2009, ―Performance of Encryption Techniques for Real Time Video
Streaming‖ IEEE Proceeding, 978-1-4244-3778-8, Page No. 130-134
Ely 1995, ―MPEG Video coding- A simple Introduction‖ in EBU Technical Review
Winter
Eskicioglu . et. al., 2003, ―Selective encryption of multimedia content in distribution
networks: Challenges and new directions‖, Proceedings of the IASTED International
Conference on Communications, Internet and Information Technology (CIIT 2003).
Scottsdale, AZ: ACTA Press.
Feng, et. al., 2012, "A theory of cloud bandwidth pricing for video-on-demand
providers," in IEEE Infocom
Fong et. al, 2009, ―On Improving the Lightweight Video Encryption Algorithms for
Real-Time Video‖ Third International Conference on Communications and
Networking
220
Gaeta et al., 2013, “StreamSmart: P2P Video Streaming for Smartphones Through
The Cloud‖, Vol. 60. In SECON
Goel et. al., 2013, ―Cloud-Based Mobile Video Streaming Techniques‖ International
Journal of Wireless & Mobile Networks, Vol. 5, No. 1, Page No. 85-92
Goel et. al., 2012, ―Cloud-Based Mobile Video Streaming Techniques‖ Global
Journal of Computer Science and Technology, Vol. 12 No 17, Page No. 47-51
Govinda et. al., 2013, ―On-Demand Secure Streaming of Multimedia Data over
Cloud‖, International Journal of Engineering and Technology, Vol. 5 No 3, Page No.
2101-2107
Goyal et. al., 2011, ―Secure Video Multimedia Communication over Networks‖,
Proceeding of Conference on, SDCN.
Griwotz et. al., 1998, ―Protecting VoD the easier way," in Proceedings of Multimedia
and Security Workshop at the 6th ACM International Multimedia Conference, Page
No. 21-28
Guleria et. al., 2013, ―To Enhance Multimedia Security In Cloud Computing
Environment Using Crossbreed Algorithm‖ International Journal Of Application or
Innovation in Engineering & Management , Vol. 2, No 6, Page No. 562-568
Gulistan and Muhammad, 2004, ―Performance comparison of advanced video
coding h.264 standard with baseline H.263 and H.263+ standards‖, IEEE International
Symposium Communication Information Technology, Vol. 2, Page No. 743-746.
Gupta et. al., 2013, ―An Enhanced Security Technique for Storage of Multimedia
Content over Cloud Server‖ International Journal Of Engineering Research And
Applications, Vol. 3, No. 4, Page No. 2273-2277
Gupta et. al., 2012, ―Mobile Cloud Computing: The Future of Cloud‖ International
Journal Of Advanced Research In Electrical, Electronics And Instrumentation
Engineering, Vol. 1No. 3, Page No. 134-145
221
Habib et. al., 2006, ―Encryption of MPEG Video Streams‖, IEEE Region 10
Conference TENCON
Hada et. al., 2011, ―Security Agents: A Mobile Agent based Trust Model for Cloud
Computing‖, International Journal Of Computer Applications, Vol. 36 No.12, Page
No. 12-15
Harish et. al., 2013, ―Hybrid Robust Watermarking Technique Based on DWT, DCT
and SVD‖ International Journal of Advanced Electrical and Electronics Engineering,
Vol. 2 No 5, Page No. 137-143
Hartung et. al., 1999, ―Multimedia Watermarking Techniques‖, Proceedings of the
IEEE, Vol. 87, No. 7, Page No. 1078-1107
Hartung, et. al. 1999, "Spread spectrum watermarking: Malicious attacks and
counterattacks", Proceedings. SPIE, Vol. 3657, Page No.147 -158
Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid
Domain‖ International Journal Of Computer Science Issues , Vol. 9, Issue 6, Page
No. 109-114
Hoecker et. al., 2013 ―An on-demand scaling stereoscopic 3D video streaming
service in the Cloud‖ Journal of Cloud Computing, Springer Open Journal
Hooda et. al., 2012, ―A Comprehensive Survey of Video Encryption Algorithms‖,
International Journal Of Computer Applications, Vol. 59 No.1 Page No. 14-19
Hovančák, 2008, ―Steganography Based On DWT Transform‖, Department of
Electronics and Multimedia Telecommunications, Technical University of Košice,
Slovak Republic, Transmission, IEEE Xplore
Huang, et. al. 2011, "CloudStream: Delivering High-Quality Streaming Videos
through a Cloud-Based SVC Proxy," in IEEE INFOCOM Mini-Conference
Huang et. Al., 2008, ―Challenges, Design and Analysis of a Large-scale P2P-VoD
System‖ In Proc. of ACM SIGCOMM
222
Ismail et. al., 2014―Selective Video Encryption System using AES (Rijndael)
Algorithm for Low Cost FPGA Chip‖ Recent Advances in Computer Engineering,
Communications and Information Technology, ISBN: 978-960-474-361-2, Page No.
318-323
Jenifer et. al., 2014, ―LSB Approach for Video Steganography to Embed
stenography to Embed Images‖ International Journal Of Computer Science And
Information Technologies, Vol. 5 No.1, Page No. 319-322
Jenisch et. al., 2014, ―A detailed evaluation of format-compliant encryption methods
for JPEG XR-compressed images‖ EURASIP Journal on Information Security, Vol. 6
Jeremiah 2004, ―Comparing media codecs for video content‖ Proceedings of the
Embedded Systems Conference, (ESC`04), San Francisco, Page No. 1-18.
Jian et. al. 2004, ―A Novel Chaos-Based Video Encryption Algorithm. Proc. of Trim
Size‖: 9in x 6in,
Jian-Wen, et. al. 2006, ―Introduction to H.264 advanced video coding‖, Proceedings
of the Asia and South Pacific Conference on Design Automation, IEEE Press Page
No. 736-741.
Jigisha et. al., 2013, ―A Hybrid DWT-SVD Method For Digital Video
Watermarking‖ International Journal Of Advanced Research In Computer And
Communication Engineering, Vol. 2 No. 7, Page No. 2771-2775
Joshi et. al., 2014, ―MV Compensation Attack on fast Selective Video Encryptions‖,
International Journal of Computational Engineering Research, Vol. 4, No. 1 Page No.
32-38
Kala et. al., 2011, ―Enhanced Selective Encryption Algorithm For Wireless Ad Hoc
Networks‖ International Journal Of Computing Technology And Information
Security, Vol.1, No.2, Page No.48-51
223
Kanrar et. al., 2012, ―Analysis and implementation of the Large Scale Video-on-
Demand System‖ International Journal of Applied Information Systems, Vol. 2
No.2, Page No. 1-9
Kapadia, et. al. 2010, "Secure cloud computing with brokered trusted sensor
networks", International Symposium on Collaborative Technologies and Systems
(CTS), Page No..581-592.
Karel, 1996, ―H.263: Video Coding for Low-Bit-Rate Communication‖, IEEE
Communication Magazine. Vol. 34, Page No. 42-45.
Karpe et. al., 2013, ―Hybrid Digital Video Watermarking based on DWT-PCA‖
International Journal of Advance Research in Computer Science and Management
Studies, Vol. 1 No., Page No. 118-127
Kaur et. al., 2013, ―Comparative Analysis and Implementation of Image Encryption
Algorithms‖ International Journal Of Computer Science And Mobile Computing, Vol.
2, No.4, Page No. 170-176
Kedia et. al., 2013, ―Non Blind Multiplicative Watermarking using 2D-DWT‖.
International Journal Of Emerging Technology And Advanced Engineering, Vol. 3,
No. 6, Page No. 453-457
Kekre et. al., 2014, ―Robust Watermarking Technique using Hybrid Wavelet
Transform Generated Kekre Transform And discrete Cosine Transform‖,
International Journal of Scientific and Research Publications, Vol. 4 No. 2 Page No.
1-13
Khalil et. al., 2014, ―Cloud Computing Security: A Survey‖ Computers, Vol. 3, Page
No. 1-35
Kharb et. al., 2011, ― A Fast Selective Video Encryption Using Alternate Frequency
Transform‖ International Journal Of Innovative Technology & Creative Engineering,
VOL.1 NO.2 Page No. 51-59
224
Kosta, et. al., 2012, ―Thinkair: Dynamic resource allocation and parallel execution in
the cloud for mobile code offloading,‖ in Proceedings IEEE INFOCOM
Kovachev et. al., 2011, "Mobile Cloud Computing: A Comparison of Application
Models," CoRR, vol. abs/1107.4940
Kulkarni et. al., 2013, ―Proposed Video Encryption Algorithm v/s Other Existing
Algorithms: A Comparative Study‖ International Journal Of Computer Applications,
Vol. 65 No.1, Page No. 1-5
Kumar et. al., 2011, ―Real time Video Streaming using Novel approach‖
International Journal of Computer Applications, Number 8 (ISBN: 978-93-80866-66-
3), Page No. 1-8
Kumar et. al., 2011, ―Non-Blind Image Watermarking Using Contourlet Transform‖,
Indian Journal Of Computer Science And Engineering, Vol. 2 No. 1, Page No. 31-38
Kumar et. al., 2012, ― An Enhanced and Effective Encrypting Algorithm for High
Volume Video Data Streaming Application on MANET‖ IJCA, International
Conference on Recent Advances and Future Trends in Information Technology, Page
No. 9-12
Kutte et. al., 2000, ―The Watermark Copy Attack‖, Proceedings of SPIES, Security
and Watermarking of Multimedia Content II, Vol 3971, Page No. 1-10
Lamba et. al., 2011, ―Cloud Computing-Future Framework for E-management of
NGO's‖ International Journal Of Advancements In Technology, Vol. 2, No 3 Page
No. 400-407
Lanjewar et. al., 2013, ―A Survey on Peer to Peer sharing using Cloud Based Mobile
Social TV (Cloud MoV)‖ International Journal of Research in Computer and
Communication Techno, Vol. 3 No 2. Page No. 236-240
Lavanya et. al., 2011, ―Cloud Based Video on Demand Model With Performance
enhancement‖, Malaysian Journal of Computer Science, Vol. 24 No. 2, Page No. 73-
83
225
Li et. al., 2009, ―Layered Encryption for Scalable Video Coding‖ IEEE Proceeding,
978-1-4244-4131-0
Li et. al., 2011 ―Cost-effective Partial Migration of VoD Services to Content Clouds‖,
IEEE 4th International Conference on Cloud Computing, 978-0-7695-4460-1/11 Page
No. 203-210
Lian et. al., 2009, ―Recent Advances in Multimedia Information System Security‖,
Informatica Vol 33, Page No. 3-24
Lin et. al., 2014, ―A Novel SVD-based Watermarking Scheme for Protecting Rightful
Ownership of Digital Images‖, Journal Of Information Hiding And Multimedia Signal
Processing, Vol. 5 No. 2, Page No. 124-143
Lint, et. al., 2009, ―An Overview of Security Issues in Streaming Video‖ IEEE
Proceedings, 0-7695-1062-0, Page No. 345-348
Liu et. al., 2005, ―A Novel Encryption Algorithm for High Resolution Video‖,
NOSSDAV’05, ACM 1-58113-987-X
Liu, et. al., 2011 "Novasky: Cinematic-Quality VoD in a P2P Storage Cloud," In
IEEE INFOCOM
Liu et. al., 2003, ―Selective Encryption of Multimedia Content in Distributed
Networks: Challenges and New Directions‖, presented at IASTED International
Conference on Communications, Internet and Information Technology
Lookabaugh et al., 2003, ―Selective encryption of MPEG-2 video," in Proceedings
of the SPIE Multimedia Systems and Applications VI
Lookabaugh et. al. 2004, "Selective encryption for consumer applications," IEEE
Communications Magazine, vol. 42, No. 5, Page No. 124-129
Maadeed et. al., 2012, ―A New Chaos-Based Image-Encryption and Compression
Algorithm‖ Journal of Electrical and Computer Engineering, Hindawi Publishing
Corporation, Vol. 2012, Page No. 1-11
226
Maggiani, 2009, ―Cloud Computing Is Changing How We Communicate‖, In IEEE
978-1-4244-4358-1/09
Mallika et. al., 2014, ―Joint Video Compression And Encryption Using Secure
Wavelet Transform And Entropy Coding‖ International Journal Of Computer Science
And Mobile Computing, Vol.3 No. 2, Page No. 483-489
Mandavgane et. al., 2014, ―Quality Assessment of Precodec Video Protection‖
International Journal of Advance Research in Computer Science and Management
Studies, Vol. 2, No 1 Page No. 264-268
Mane et. al., 2013, ―Review Paper on Video Watermarking Techniques‖,
International Journal of Scientific and Research Publications, Vol. 3No 4, Page No. 1-
5
Manikandan et. al., 2012, ―Watermarking Techniques‖, International Journal Of
Computers & Technology, Volume 2 No. 3, Page No. 122-124
Mao et. al. 2013 ,."A survey of mobile cloud computing for rich media applications",
IEEE Wireless Comm., Vol. 20, No. 3, Page No. 46-53
Marcel et. al. 1997, ―Low-bitrate video coding based upon geometric
transformations‖ Proceeding of the pro RISC Work on Circuits, System and Signal
Processing, Page No. 561-568
Margaret et. al., 2012, ―Reversible Data Hiding In Encrypted Images by XOR
Ciphering Technique‖ International Journal Of Advanced Research In Electrical,
Electronics And Instrumentation Engineering, Vol. 3, Issue 2, Page No. 7287-7293
Masoumi et. al., 2014, ―Content Protection in Video Data Based on Robust Digital
Watermarking Resistant to Intentional and Unintentional Attacks‖, International Arab
Journal of Information Technology, Vol. 11, No. 2 Page No. 204-212
Massoudi et. al., 2008, ―Overview on Selective Encryption of Image and Video
Challenges and Perspectives‖, EURASIP Journal on Information Security, Hindawi
Publishing Corporation Volume 2008, Page No. 1-18
227
Mee-Hey, et. al. 1998, ―A study on the integration and synchronization of video
image using H.261 in polysomnography‖ Eng. Med. Biol. Soc., Proceedings 20th
Annual. International Conference IEEE, Vol. 4, Page No. 1960-1963.
Meyer et. al., 1995, ―Security Mechanisms for Multimedia Data with the Example
MPEG-1 Video‖, Project Description of SECMPEG
Mobasseri, 1998, ―Direct sequence watermarking of digital video using m-frames,‖
Proceedings International Conference on Image Processing (ICIP-98), Vol. 3, Page
No. 399-403
Mohan et. al., 2014, ―Secured Robust Video Data Hiding Using Symmetric
Encryption Algorithms‖, International Journal of Innovative Research in Engineering
& Science, Vol. 1, No. 3, Page No. 17-29
Moideen et. al., 2014, ―A Novel Method for Data Hiding In Encrypted Image And
Video‖, International Journal Of Emerging Technology And Advanced Engineering,
Vol. 4 No. 2 Page No. 538-542
More et. al., 2014, ―Efficient TIMG Algorithm for Secure Transmission of Data‖
special issue of International Conference on Advances in Engineering & Technology,
IOSR Journal of Computer Science (IOSR-JCE) , Page NO 43-46
Morris, 1995, ―MPEG-2: where did it come from and what is it?‖, Proceedings of the
IEE Colloquium on MPEG-2- What it is and What it isn`t, Page No. 1-5
Mosbah et. al., 2013, ―Current Services In Cloud Computing: A Survey‖
International Journal of Computer Science, Engineering and Information Technology,
Vol.3, No.5, Page No. 1-8
Mukhopadhyay et. al. 2013, ― Enhanced Security for Cloud Storage using File
Encryption‖
Naderi et. al., 2012, ―Image Encryption Using a Lightweight Stream Encryption
Algorithm‖ Advances in Multimedia, Hindawi Publishing Corporation Vol. 2012, No.
08 Page No. 1-11
228
Nanjunda et. al., 2005, ―Robust Encryption for Secure Image Transmission over
Wireless Channels‖ Proceedings IEEE International Conference Communications,
Vol. 2, pp.1287 -1291
Nehete et. Al. 2003, ―A Real-time MPEG Video Encryption Algorithm using
AES",NCC
Nithyabharathi et. al., 2014, ―To Enhance Multimedia Security in Cloud Computing
Environment Using RSA and AES‖, International Journal of Science, Engineering
and Technology Research, Vol. 3, No. 2, Page No. 341-345
Niu, et. al. 2012, ―Quality-Assured Cloud Bandwidth Auto-Scaling for Video-on-
Demand Applications‖. IEEE Infocom
Pallickara, et. al. 2009, “Granules: A Lightweight, Streaming Runtime for Cloud
Computing With Support for Map-Reduce‖. In: IEEE International Conference
Payberah, 2013, ―Live Streaming in P2P and Hybrid P2P-Cloud Environments for
the Open Internet,‖ Ph.D. dissertation, KTH
Peerzada et. al., 2014, ―An Analytical Review of the Multimedia Data and
Encryption Mechanism at Cloud Server‖ International Journal of Innovative Research
in Computer and Communication Engineering, Vol. 2, No. 2, Page No. 3341-3348
Podesser et. al., 2002, ―Selective Bitplane Encryption for secure Transmission Of
Image Data In Mobile Environments‖ CD-ROM Proceedings of the 5th IEEE Nordic
Signal Processing Symposium (NORSIG 2002), 2002
Poongodi et. al., 2014, ―The Transmission of Image and Data Through Video Signal
Using Wavelet Transform‖ International Journal of Innovative Research in Science,
Engineering and Technology, Vol. 3, No. 4 Page No. 11345-11349
Prabhu et. al., 2014, ―User Behaviour Prediction Based Adaptive Mobile Video
Streaming and Efficient Social Video Sharing in the Clouds‖, International Journal of
Innovative Research in Computer and Communication Engineering, Vol.2 No. 1
229
Qiao and Nahrstedt, 1997, “A new algorithm for MPEG video encryption‖ In Proc.
of First International Conference on Imaging Science System and Technology, Page
No. 21–29
Qiao and Nahrstedt, 1998, "Comparison of MPEG encryption algorithms"
International Journal of Computer Graphics., Special Issue on Data Security in Image
Communications and Networks, Vol. 22, No. 3
Qiu et. al., 2013, ―A hybrid watermarking scheme for H.264/AVC video‖ IEEE
Computer Society, Proceedings of the 17th International Conference on Pattern
Recognition
Qiu et. al., 2004, ―A hybrid watermarking scheme for H.264/AVC video‖ IEEE,
Proceedings of the 17th International Conference on Pattern Recognition, 1051-
4651/04
Ragab et. al., 2014, ―Encryption Quality Evaluation of Robust Chaotic Block Cipher
for Digital Imaging‖ International Journal Of Recent Technology And Engineering,
Vol. 2 No.6, Page No. 4-9
Rahman et. al., 2013, ―A DWT, DCT and SVD Based Watermarking Technique to
Protect The Image Piracy‖, International Journal Of Managing Public Sector
Information And Communication Technologies, Vol. 4, No. 2, Page No. 21-32
Rajagopal et. al., 2013, ―A Survey of Video Encryption Algorithms Implemented In
Various Stages of Compression‖, International Journal Of Engineering Research &
Technology, Vol. 2 No.2, Page No. 1-12
Raju, et. al. 2008, "A Novel Video Encryption Technique based on Secret Sharing",
Proceedings of International Conference on image Processing Page No. 3136-3139,
Raju et. al. 2008, "A Real-Time Video Encryption Exploiting the Distribution of the
DCT coefficients," TENCON-IEEE Region 10 Conference
230
Raju et. al., 2008, ―Fast and Secure Real-Time Video Encryption‖, IEEE Computer
Society, Sixth Indian Conference on Computer Vision, Graphics & Image Processing,
978-0-7695-3476-3 Page No. 257-263
Ramzan et. al. 2012, ―Video streaming over P2P networks: Challenges and
opportunities‖, Image Communication, Vol. 27 No. 5, Page No. 401--411
Rao et. al., 2014, ―A Smart Intelligent Way of Video Authentication Using
Classification and Decomposition of Watermarking Methods‖, International Journal
Of Computer Trends And Technology, Vol. 10 No. 3, Page No. 136-142
Reddy et. al., 2014, ―The Indexing Algorithm for Scrambled Frames in Video
Encryption‖, International Journal Of Advanced Research In Computer Science And
Software Engineering, Vol. 4 No. 2, Page No. 651-655
Redmill et. al. 2007, ―A novel secure H.264 transcoder using selective
encryption‖. IEEE IV-85 - IV-88.
Reilly et. al., 2011, ―Cloud Computing: Pros and Cons for Computer Forensic
Investigations‖ International Journal Multimedia and Image Processing, Vol. 1No.1
Page No. 26-34
Riad et. al., 2013, ―A Framework for Cloud P2P VoD System based on User's
Behavior Analysis‖ International Journal Of Computer Applications, Vol. 76 No.6
Page No. 20-26
Roden, 1996, ―H.261 and MPEG1-a comparison‖, Proceedings of the IEEE 15th
Annual International Conference, Page No. 65-71
Rong et. al., 2012 ―A Secure Data Access Mechanism for Cloud Tenants‖,
Proceeding of the Third International Conference on Cloud Computing, GRIDs, and
Virtualization, ISBN: 978-1-61208-216-5, Page No. 113-119
Salleh, 2003, “Image encryption algorithm based on chaotic mapping‖. Journal
Teknologi, 39(D) Page No. 1–12
231
Sandhu et. al., 2013, ―An Approach to Enhanced Security of Multimedia Data Model
Technology Based on Cloud Computing‖ International Journal Of Advanced
Research In Computer Science And Software Engineering, Vol. 3, No 7, Page No.
724-728
Saranya et. al., 2011, ―A H.264 based Selective Video Encryption for Mobile
Applications‖ International Journal of Computer Applications, Volume 17– No.4,
Page No. 21-25
Sathik et. al., 2012, ―Authentication of Digital Images by using a semi-Fragile
Watermarking Technique‖, International Journal Of Advanced Research In Computer
Science And Software Engineering ,Vol. 2, No. 11, Page No. 39-44
Satyanarayanan et. al. 2009, ―The case for VM-based Cloudlets in mobile
computing,‖ IEEE Pervasive Comput., Vol. 8, Page No. 14–23
Schatz et. al., 2007, ―Mobile TV becomes social – Integrating content with
communications,‖ in Proceedings. ITI
Shah et. al., 2011 ―Video Encryption: A Survey‖, International Journal Of Computer
Science Issues, Vol. 8, Issue 2 Page No. 525-534
Shahid et. al., 2010, ―Over the Real-Time Selective Encryption Of AVS Video
Coding Standard‖, EUSIPCO'10: 18th European Signal Processing Conference,
Aalborg : Denmark
Shahid et. al., 2010, ―Selective Encryption Of C2DVLC Of AVS Video Coding
Standard For I & P Frames‖, IEEE Proceedings, 978-1-4244-7493-6
Shamily et. al., 2012, ―A Review on Multimedia Cloud Computing, its Advantages
and Challenges‖ International Journal Of Advanced Research In Computer
Engineering & Technology, Vol. 1No. 10, Page No. 130-133
Sharma et. al., 2012, ―DWT-SVD Based Efficient Image Watermarking Algorithm
to Achieve High Robustness and Perceptual Quality‖, International Journal Of
232
Advanced Research In Computer Science And Software Engineering, Vol. 2 No. 4,
Page No. 75-78
Sharma et. al. 2014, ―Performance analysis of video formats encoding in cloud
environment. IOSR Vol. 56 Page No. 73-78
Shi, Wang, and Bhargava, 1999, ―MPEG Video Encryption in Real-Time Using
Secret key Cryptography,‖ International Conference on Parallel and Distributed
Processing Techniques and Applications
Shi. and Bhargava, 1998, ―A Fast MPEG Video Encryption Algorithm,‖
Proceedings of the 6th International Multimedia Conference
Shunmugapriya et. al., 2014, ―Multimedia Security With Multi Agent System‖
Australian Journal of Basic and Applied Sciences Vol. 8 No. 3, Page No. 120-125
Sikora et. al. 1995, ―Digital Video Coding Standards and Their Role in Video
Communications‖, Proceedings of the IEEE Vol. 83, Page No. 907-923
Sikora, "The MPEG-1 and MPEG-2 Digital Video Coding Standards", IEEE Signal
Processing Magazine
Sikora, 1999, ―Digital Video Coding Standards and Their Role in Video
Communications‖ In: Signal Processing for Multimedia, Page No. 225.
Sikora, 1997, ―MPEG digital video-coding standards‖, MPEG Digital Video-Coding
Standards, Vol. 14, Page No. 82-100.
Singh et. al., 2011, ―Fast Random Bit Encryption Technique for Video Data‖,
European Journal of Scientific Research, Vol.64 No.3 Page No. 433-445
Singh et. al., 2011 ―A Survey on Joint Compression and Encryption Techniques for
Video Data‖, Journal Of Computer Science, Vol. 8 No.5, Page No. 731-736
Sinha et. al., 2011, ―Digital Video Watermarking using Discrete Wavelet Transform
and Principal Component Analysis‖, International Journal of Wisdom Based
Computing, Vol. 1 No. 2, Page No. 7-12
233
Sivakami et. al., 2014 ―A Digital Watermarking System For Video Authentication
Using The DCT‖ International Journal Of Engineering Research & Technology, Vol.
01, Page No. 22-33
Slagell et. al. 2004, ―Known-Plaintext Attack Against a Permutation Based Video
Encryption Algorithm‖ Available http://eprint.iacr.org/2004/011.pdf .
Socek et. al. 2006, ―A Permutation-based Correlation- Preserving Encryption Method
for Digital Videos," in International Conference on Image Analysis and Recognition,
LNCS 4141, Page No.547-558.
Socek et. al. 2003, ―Cryptanalysis of Video Encryption Algorithms,‖ to appear in
Proceedings of The 3rd Central European Conference on Cryptology TATRACRYPT
Sona et. al., 2013,―A Survey On Efficient Video Sharing And Streaming In Cloud
Environment Using VC‖, International Journal of Innovative Research in Computer
and Communication Engineering ,Vol. 1,No.8, Page No. 1775-1780
Spanos and Maples, 1995, ―Performance Study of a Selective Encryption Scheme
for the Security of Networked, Real-time Video,‖ Proceedings of 4th International
Conference on Computer Communications and Networks
Su et. al., ―A novel approach to collusion-resistant video watermarking‖, Proceedings
of the SPIE, vol. 4675, Page No. 491-502.
Sulong, 2012, ―A New Color Image Watermarking Technique Using Hybrid
Domain‖, International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1,
Page No. 109-114
Sullivan et.al., 2012, ―Overview of the High Efficiency Video Coding(HEVC)
Standard ‖ IEEE Transactions On Circuits And Systems For Video Technology, Vol.
22, No. 12 Page No. 1649-1668
Sullivan, and Wiegand, 2005, ―Video compression from concepts to the H.264/AVC
standard‖, Proceeding IEEE, Page No. 18-31
234
Suryadi et. al., 2012 ―Enhancement of Video Encryption Algorithm Performance
Using Finite Field Z2 3-Based Chaotic Cipher‖, Journal Of Communication And
Computer, Vol. 9 Page No.960-964
Swanson, et. al., 1997, ‖Object- Based Transparent Video Watermarking,‖
Proceedings IEEE Signal Processing Society, Workshop on Multimedia Signal
Processing
Tang, 1996, ―For encrypting and decrypting MPEG video data efficiently‖, in
Proceedings of The Fourth ACM International Multimedia Conference, Page No. 219-
230.
Thapa et. al. 2011, ―On Secure Digital Image Watermarking Techniques‖ Journal of
Information Security, Vol. 2, Page No. 169-184
Tong et. al., 2012, ―Layered Video Encryption Utilizing Error Propagation in
H.264/AVC‖ EEESYM IEEE Symposium on Electrical & Electronics Engineering,
978-1-1673-2365-9, Page No. 182-187
Tosun et. al., 2001, ―On Error Preserving Encryption Algorithms for Wireless Video
Transmission‖, Proceedings of the ninth ACM international conference on
Multimedia, September 30-October 05, 2001, Ottawa, Canada
Um et. al., 2006, ―Selective Video Encryption Of A Distributed Coded Bitstream
Using LDPC Codes‖, Proceeding of SPIE-IS&T Electronic Imaging, SPIE Vol. 6072,
60721B Vol.1
Van et. al., 2005, ―A Model-Based Analysis of Secure Video Transmission Based on
IPSec and IPv4‖, Electronics & Telecommunications Research Institute Journal,
Volume 27, No. 2 Page No. 219-222
Vassaux, et. al. 2002 ―Scrambling technique for video object watermarking resisting
to MPEG-4,‖ Proceedings Video/Image Processing and Multimedia Communications
4th EURASIP-IEEE Region 8 International Symposium on VIPromCom, Page No.
239-244
235
Veerasamy et. al., 2014, ―Video Watermarking using Wavelets‖, International
Journal of Research in Engineering & Advanced Technology, Vol. 1 No.6, Page No.
1-6
Vijayalakshmi et. al., 2014, ―Data Encryption hiding technique in non-standard
cover files‖ International Journal of Advanced Research in Computer Science &
Technology Vol. 2 No.1, Page No. 55-59
Wang et. al., 2013, "Adaptive Mobile Cloud Computing to Enable Rich Mobile
Multimedia Applications", IEEE Transactions on Multimedia, Vol. 15, N.4, Page No.
870-883
Wang et. al. 2007, ―A New Lightweight and Scalable Encryption Algorithm for
Streaming Video over Wireless Networks‖, International Conference on Wireless
Network, Page No. 180-185
Warhekar et. al., 2014, ―Implementing Mobile Multimedia Applications Using
Cloud Computing‖ International Journal Of Computer Science And Information
Technologies, Vol. 5 No. 1, Page No.230-232
Wiegand et. al., 2003, ―Overview of the H.264/AVC video coding standard‖, IEEE
Transactions Circuits Syst. Video Technol., Vol. 13, Page No. 560–576
Wolfgang et. al., 1999, ―Perceptual watermarks for digital images and video‖,
Proceedings of the IEEE, Vol. 87, Page No. 1108-1126
Wolfgang et al., 1997, "Overview of image security techniques with applications in
multimedia systems," Proceeding of the SPIE Conference on Multimedia Networks:
Security, Displays, Terminals, and Gateways, Vol. 3228, Page No. 297-308.
Wong et. Al. 2006, ―An efficient, parallel multikey encryption of compressed video
streams‖ The proceedings of International Conference on Signal and Image
Processing
Wu et. al., 2005, ―Design of Integrated Multimedia Compression and Encryption
Systems‖ IEEE Transactions On Multimedia, Vol. 7, No. 5 Page no. 828-839
236
Wu et. al., 2013, ―Cloud MoV: Cloud-Based Mobile Social TV‖, IEEE Transactions
On Multimedia, Vol. 15,No. 4,
Xiong et. al., 2012, ―Towards End-to-End Secure Content Storage and Delivery with
Public Cloud‖ CODASPY’12, ACM 978-1-4503-1091-8
Xiuhui et. al., 2008, ―Research on Application of Immune Digital Watermark
Algorithm‖ IEEE Computer Society, International Conference on Computer Science
and Software Engineering, 978-0-7695-3336-0
Yang et. al., 2008, ―A video encryption method based on chaotic maps in DCT
domain‖ Progress in Natural Science Elsevier, Vol. 18 No. 1, Page No. 1299-1304
Yeo et. al., 2009, ―Cloud computing and emerging IT platforms: Vision, hype, and
reality for delivering computing as the 5th
utility. Future Generation Computer
Systems, Vol. 25, No. 6, Page No. 599–616
Yerawar et. al., 2014, ―Encryption and Watermarking Used To Secure Live Video‖,
World Research Journal of Human-Computer Interaction, Volume 1, No. 1 Page No.
01-03.
Yuan et. al. 2003, ―Efficient and Fully Sealable Encryption for MPEG-4 FGS‖, IEEE
Transaction, 0-7803-7761-3, Page No. 620-623
Zambreno et. al., 2013, ―Securing Multimedia Content using Joint Compression and
Encryption‖, Multimedia IEEE, Vol. 20, No. 4, Page No. 1-12
Zhang et. al., 2005, ―An image encryption approach based on chaotic maps‖ Chaos,
Solitons and Fractals, Elsevier, Vol. 24, Page No. 759–765
Zhang et. al. 2007, ―Robust Video Watermarking of H.264/AVC‖, IEEE
Transactions on Circuits and Systems—II: Express Briefs, Vol. 54, No. 2, Page No.
205-209
Zheng et. al., 2010, ―A measurement study on user behavior of p2p VoD system, in
'Informatics in Control, Automation and Robotics (CAR)‖, 2nd
International Asia
Conference on', Page No. 373-376
237
Zhou et. al., 2014, ―Image Encryption Using Binary Bit Plane‖ Signal Processing
Elsevier, Vol. 00 No. 12, Page No. 1-25
Zhu et. al., 2013, ―Robust And Simple N-Party Entangled Authentication Cloud
Storage Protocol Based On Secret Sharing Scheme‖ Journal Of Information Hiding
And Multimedia Signal Processing, Vol. 4, No. 2, Page No. 110-118
238
BIBLIOGRAPHY
Books Referred
Harris, 2007, SICCP Exam Guide, fourth edition, McGraw-Hall
Kessler, 1998, An Overview of Cryptography,
Sikora, "MPEG Digital Video Coding Standards", In Digital Electronics Consumer
Handbook, McGraw Hill Company,
Wang et. al., 2001, ―Video Processing and Communications‖ Prentice Hall, Signal
Processing Series
William, 2007, Network Security Essentials, applications and Standards , Pearson
Education, Inch.
White, 2003, Cisco Security+ Certification: Exam Guide, McGraw-Hill.
Articles Referred
Ali, 1999, ―Video compression: MPEG-4 and beyond‖ Retrieved from
http://www.cse.wustl.edu/~jain/cis788-99/compression/
David, 1980, ―Cryptology Goes Public‖, Communications Magazine, IEEE,
Diffie & Hellman, 1976, ―New Directions in Cryptography‖, IEEE Transactions On
Information Theory
E-line, 2011, ―Cloud Video Management‖ Article
Figliola et. al., 2014, ―Overview and Issues for Implementation of the Federal Cloud
Computing Initiative: Implications for Federal Information Technology Reform
Management‖, CRS Report
239
Jarnikov et. al. 2014 ―A Watermarking System for Adaptive Streaming‖, white
paper, IRTEDO
Salah, 2003, ―A Light-Weight Encrypting For Real Time Video Transmission‖
Technical Report
Shoemaker, 2002 ―Hidden Bits: A Survey of Techniques for Digital Watermarking‖,
Independent Study
White Paper, 2008. An explanation of video compression techniques.
http://www.axis.com/corporate/corp/tech_papers.htm.